General
-
Target
7b70469bba9d761d9b90c49c596575d6.bin
-
Size
421B
-
Sample
231007-b882yagg5w
-
MD5
2724334c6a53f2c236c14b2d248b56fa
-
SHA1
a6796935ad6f476f21776e1bc073b6334ab3340b
-
SHA256
f53a5dc044ad8b769397a3f6a36747cb5a66548e13ed4a7ea313337545c3c3aa
-
SHA512
664b09650d55fb67f38aa69eed47fea0e02a6f226e4d94fdf8d5982217ab0b06b06e5dc73832a0d348b51e8e8c605abb51bd773a879f9a3d503eec6483393493
Static task
static1
Behavioral task
behavioral1
Sample
63b506c0917d35cbf539bad3ad26d82ea3edbe50ba3f09f6e39a03c969fa8cfd.ps1
Resource
win7-20230831-en
Malware Config
Extracted
http://communicalink.com/putty.exe
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Targets
-
-
Target
63b506c0917d35cbf539bad3ad26d82ea3edbe50ba3f09f6e39a03c969fa8cfd.ps1
-
Size
172B
-
MD5
7b70469bba9d761d9b90c49c596575d6
-
SHA1
ca89ca05ee36b580f713b1e17bb4694506069622
-
SHA256
63b506c0917d35cbf539bad3ad26d82ea3edbe50ba3f09f6e39a03c969fa8cfd
-
SHA512
855656cadc203011b9ee0d66309c399e9641461682fe7cd930de076964aea976aba20919e2cea34f0b5ce8400dffd0fa44564ddd94b0746e0c6e0d74de682984
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-